ブログ

2) The onion that is peeled was sliced and measured homogenized.

2) The onion that is peeled was sliced and measured homogenized.

Share this: Twitter Twitter Reddit LinkedIn WhatsApp  

The TCP information is received by OR from slot an and it is prepared by TCP and TLS protocols. Then your prepared information is delivered to the TLS buffer. The event that is read called to read and process the data pending in the TLS buffer. This read occasion shall pull the data from TLS buffer into the input buffer. Then your event that is read cells from input buffer 1 by 1. Each OR has routing dining table which keeps map from supply circuit and connection ID to location connection and circuit ID.

The transmission way associated with the cell can be based on the event that is read. The corresponding symmetric key is used to decrypt / encrypt the payload of the cell, replace the present circuit ID with destination circuit ID to append the cell to the destination circuit. The cell can be written straight for the location connection if there is no information waiting in production buffer plus the event that is write added to the event queue. The data is flushed to TLS buffer of destination after calling the write event. Then write event pull as many cells that you can from circuit to production buffer and include compose occasion to occasion queue. The following event that is write on flushing information to production buffer and pull cells to production buffer else the mobile queued in circuit queue can be delivered to network via slot B by calling write occasion twice.

Fig. 2Processing the cells at Onion router

The internet protocol address packets in Tor network is very based and dynamic with this the cell – counting based assault implemented.

Step one: SELECTING THE GOAL :- The attacker log the given information during the exit OR, including the server host IP address and slot for the circuit and circuit ID and uses CELL – RELAY-DATA to transmit the data flow.

Action 2: ENCODING THE SIGNAL :- before the event that is write called the CELL – RELAY – INFORMATION are going to be waited in the circuit queue. Following the event that is write called then your cells are flushed into production buffer. Hence the attacker can manipulate the true number of cells flushed to the output buffer all together. In this way the attacker can in a position to embed the signal that is secret. To encode bit 1, the attacker can flushes three cells from circuit queue as well as for bit 0, flushes one cell from circuit queue.

Our experts that are academic prepared and waiting to assist with any writing task you could have. From easy essay plans, right through to dissertations that are full you are able to guarantee we have a service completely matched to your needs.

Step three: RECORDING PACKETS :- following the sign is embedded in the target traffic it shall be sent to the entry OR along side target traffic. The attacker during the entry OR will record the gotten cells and associated information and need to see whether the cells that are received CELL – RELAY – DATA cells.

Step 4: RECOGNIZING THE EMBEDDED SIGNAL :- The attacker goes into the phase of recognizing the embedded sign with all the cells that are recorded. For this utilized the data recovery mechanisms. Once the signal that is original identified the attacker can connect the interaction between Alice and Bob.

There are two main critical issues related to assault: (1) Encoding signals at exit OR: Two cells aren’t sufficient to encode bit that is“1. Because then it will be easily distorted over network and also hard to recover if the attacker uses two cells to encode bit “1. When the two cells arrive at the input buffer at the center OR, the cell that is first be pulled into circuit queue and then in the event that production buffer is empty, the first cell are going to be flushed involved with it.https://medium.com/@vladimirtrofimov049/3-best-business-essay-samples-89565e1951d8 Then your cell that is second be pulled to the circuit queue. Since the production buffer is not empty, the cell that is second in the circuit queue. When the write event is called, the very first cell are going to be delivered to the network, while the 2nd cell written to the production buffer and wait for next event that is write. Consequently, two initially combined cells are going to be split into two split cells during the router that is middle. So that the attacker during the entry OR will observe two cells that are separate at the circuit queue. This cells are going to be decoded as two “0” bits, leading the attacker up to a detection that is wrong of sign. The attacker should choose at least three cells for carrying bit “1” to deal with this issue.

For transmitting cells, appropriate wait period should really be chosen: In the event that wait period one of the cells is simply too big, users aren’t able to tolerate the sluggish traffic and to transmit the data will select another circuit. Whenever this condition happens the assault shall fail. And then it will increase the chance that cells may combined at middle OR. if the delay interval is too small,

(2) Decoding signals during the entry OR: Distortion of sign: anyhow the combination and unit associated with the cells will happen due to network that is unpredictable and congestion. This will result in the signal that is embedded be altered plus the probability of recognizing the embedded sign may be reduced. A recovery mechanism can be used, that recognize the embedded sign because of this distortion of the signal.

The division and combination of cell can be classified into four kinds: (1) Two types of the cell unit for the unit associated with the sign and (2) Two types of the cell combination for various devices of sign. The recovery algorithm can be used to deal with these types of division and combination types of the cells. In the event that number of cells recorded in the circuit queue is smaller compared to how many the signal that is original restored as either two types of cell unit for the unit associated with the sign. Assume the number of cells recorded in the circuit queue is bigger than the number of cells to carry the sign; the signal that is recovered be either two associated with the cell combination for various devices of sign. When the signals are restored in these types with k ≤ 2, can consider why these signals are effectively identified otherwise can’t be identified.

In this paper, we introduced a cell-counting attack that is based Tor system. This will verify the communication that is anonymous the user quickly and accurately and it is very difficult to identify. The attacker during the exit OR manipulates the transmission of cells through the target TCP flow and embeds a signal that is secret the cell countertop variation associated with the TCP flow. Then your attacker during the entry OR acknowledges the signal that is embedded developed recovery algorithms and links the interaction relationship one of the users. The detection rate is monotonously increasing function with the delay interval and decreasing function of the variance of one way transmission delay along a circuit in this attack. This assault could drastically and quickly degrade the anonymity solution that Tor provides. Because of the fundamental design associated with the Tor network, protecting from this assault remains a really task that is challenging we’ll investigate in future work.

REFERENCES

[1] W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, “DSSS-based flow marking technique for hidden traceback,” in Proc. IEEE S&P,May 2007, pp. 18–32.

[2] N. B. Amir Houmansadr and N. Kiyavash, “RAINBOW: A robust and hidden watermark that is non-blind network flows,” in Proc.16thNDSS, Feb. 2009, pp. 1–13.

[3] V. Shmatikov and M.-H. Wang, “Timing analysis in low-latency MIX networks: assaults and defenses,” in Proc. ESORICS, 2006, pp. 18–31.

[4] V. Fusenig, E. Staab, U. Sorger, and T. Engel, “Slotted packet attacks that are counting privacy protocols,” in Proc. AISC, 2009, pp. 53–60.

[5] X. Wang, S. Chen, and S. Jajodia, “Tracking anonymous voIP that is peer-to-peer on the web,” in Proc. 12th ACM CCS, Nov. 2005, pp.81–91.

[6] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, “Lowresource routing assaults against anonymous systems,” Univ. Colorado Boulder, Boulder, CO, Tech. Rep., Aug. 2007.

[7] X. Fu, Z. Ling, J. Luo, W. Yu, W. Jia, and W. Zhao, “One mobile is sufficient to break Tor’s anonymity,” in Proc. Ebony Hat DC,Feb.2009[Online]. Available: http://www.blackhat.com/presentations/bh-dc-09/Fu/

EbonyHat-DC-09-Fu-Break-Tors-Anonymity.pdf

[8] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: Anonymity online,” 2008 [Online]. Available: http://tor.eff.org/index.html.en

[9] R. Dingledine and N. Mathewson, “Tor protocol specification,”2008 [Online]. Available: https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec.txt

[10] J. Reardon, “Improving Tor utilizing a TCP-over-DTLS tunnel,” Master’s thesis, University of Waterloo, Waterloo, ON, Canada, Sep. 2008.

,

To export a reference to this short article please select a stye that is referencing:

If you are the writer that is original of essay with no much longer want your work posted on the UKDiss.com web site then please:

Related Services

,

Our academic writing and marking solutions will allow you to!

Related Lectures

,

Study at no cost with our range of college lectures!

,

Looking for the role that is flexible
Do you have a 2:1 level or higher?

Study Resources

,

Free resources to assist you with your college studies!

We have gotten press that is widespread since 2003

Your UKEssays purchase is secure and we’re ranked 4.4/5 on reviews.co.uk

All work is written to purchase. No plagiarism, assured!

We are right here to answer any relevant concerns you have about our solutions

Copyright © 2003 – 2020 – UKEssays is a trading title of most responses Ltd, an ongoing business registered in England and Wales. Business Registration No: 4964706. VAT Registration No: 842417633. Registered Information Controller No: Z1821391. Registered office: Venture Home, Cross Street, Arnold, Nottingham, Nottinghamshire, NG5 7PJ.

*You can also browse our help articles right here >

, “

1052 terms (4 pages) Essay

7th Aug 2018 Biology guide this

Disclaimer: this ongoing work is submitted by a college pupil. This isn’t an example of the ongoing work made by our Essay composing provider. You will see samples of our work that is professional right here.

Any opinions, findings, conclusions or guidelines expressed in this product are the ones associated with the writers and don’t necessarily mirror the views of UKEssays.com.

The test was about the characterization and isolation of DNA. The DNA was separated through the onion. The mass associated with the DNA that is isolated 15.11 g. The purity of remote DNA ended up being estimated by determining the ratio based through the absorbance at 280nm and 260nm lead to 0.671 meaning more protein was consumed. Meanwhile in denaturation of DNA, the absorbance that is initial 260 nm was 1.304 higher than the absorbance at 260 nm after heating that has been 1.095.

If you need advice about composing your essay, our professional essay writing service is right here to aid!

Deoxyribonucleic acid (DNA) is the material that is genetic people and all sorts of other organisms. DNA isolation may be the elimination of DNA through the cell which it normally resides. Isolation is the elimination of DNA through the cell by which it normally inhabits. (1)

Onions are used since it contains amount that is little of that allows the DNA to be much more noticeable. The filtrate is made up of onions addressed with sodium, distilled water and detergent collectively called as lysis solution. DNA purification is done by enzymatic degradation of contaminating proteins with ethanol. A spectrophotometer is used in determining the purity and concentration associated with the proteins. (2)

The onion that is peeled was sliced and measured homogenized. The test was put in a blender added by having an lysis that is ice-cold then for 45 moments at low rate. Meanwhile, the lysis solution utilized was prepared beforehand by blending 5.00 ml of fluid detergent, 5.00 ml of 0.500M EDTA, 10.0 ml of 50% Na Cl solution, and 80 ml of distilled water and put in an ice shower. After homogenizing, the test was filtered through the cheesecloth plus the collected filtrate was put in a beaker that is 250-ml. A 10.0 ml of 5% pepsin solution was added to the filtrate and positioned on an ice shower for 10 minutes with occasional stirring. Ice cold 30.0 ml of 95per cent ethanol was pipette to the relative part associated with the beaker containing the test and are a symbol of 10 minutes on ice shower. When the DNA precipitates showed up during the interface associated with the solution, the DNA had been prepared for isolation. The DNA that is spooled moved immediately up to a pre-weighed 100-ml beaker to look for the mass and % yield associated with the test. The remote DNA was added with 10.0 ml of 95per cent ethanol then covered with aluminum foil and refrigerated in preparation for the laboratory procedure that is next.

Small level of DNA sample was put in a test pipe added with 1.00 ml of 20% TCA accompanied by warming the test for 10 minutes in water shower with 1.00 ml water that is distilled. A 2.00 ml of diphenylamine solution had been added then temperature again in a water shower for 10 minutes. The color modification was seen plus the absorbance associated with the test from 400 nm to 700 nm was scanned to look for the wavelength of maximum absorption. Mean while, small level of the DNA sample was put in a test that is separate filled with 5.00 ml distilled water and scanned to read the absorbance at 260 nm then at 280 nm. The sample was heated to boil for 5 minutes and read the absorbance adain at 260 nm after determining the a260/A280 value.

The mass associated with the sample that is raw from onion is 30.4 g. After homogenization and adding of pepsin ethanol and solution, DNA precipitates had been became visible and transferred to another beaker. The DNA that is isolated 23 g.

The determined portion yield was quite high. Nevertheless, nevertheless some sources of mistake was done while performing the test, the test with DNA precipitates was disrupted while moving the DNA. The accumulated DNA precipitates is sufficient for the following procedure which is characterization.

Heat denaturation of DNA, causes the dual helix framework to relax and form solitary DNA that is stranded. Thus, the bases unstacked and can absorb more light causing an increase after denaturation. But based on the outcomes collected, the absorbance that is initial 260 nm was 1.304 then was reduced after heating which was 1.095. The determined percent increase in absorbance was 8%. This mistake is maybe, because of the heating procedure. The DNA acquired was quite greater and was not completely heated afterward causing dual helix framework to not relax and form a single DNA that is stranded.

Our experts that are academic prepared and waiting to assist with any writing task you could have. From easy essay plans, right through to dissertations that are full you are able to guarantee we have a service completely matched to your needs.

The filtrate collected out of this test was made of onions and lysis solution. Onion was used in this research due to low starch content, allowing the DNA to be much more visible considering the onion among the source that is best of DNA. (4)

The utilized of lysis solution would be to separate the DNA from extra cell elements and to keep the location in which the DNA will not be tainted. The NaCL provides NA+ ions that will impair the charge that is negative of phosphate ends of DNA. Allowing these ends to come nearer so they really can precipitate away from a solution that is cold. The detergent causes the wearing down of this cell membrane layer by emulsifying the cell proteins and lipids. Additionally, disrupting the connections that are polar collectively holds the cell membrane layer. The buildings formed with one of these lipids and proteins causes the precipitate away from solution. Meanwhile, the purpose of EDTA would be to chelates steel ions. (5) A Pepsin solution was used for purification via enzymatic degradation.

DNA is polar because of its extremely phosphate that is charged which makes it dissolvable in water. Thus DNA is insoluble in ice ethanol that is cold because of this when the cool ethanol was added, it causes stable ionic bonds to form and precipitate the DNA.

Warming the test is the one responsible for the color that is observed of with diphenylamine. Once the DNA is heated with acid, the 2-deoxyribose is converted to aldehyde that is w-hydroxylaevulinic which responds because of the compound diphenylamine. Through this, a compound that is blue-colored to produce. The color observed was green possibly because of the DNA concentration in our sample.

The ratio of absorptions at 260 nm vs 280 nm is frequently utilized to evaluate DNA contamination of protein solutions. The acids that are nucleic DNA and RNA, absorbs at 260 nm and proteins absorb at 280 nm. Based on the total outcomes, the price ratio of absorptions at 260 nm vs 280 nm is 0.671. The ratio is low meaning there is a lot of protein absorbed at 280nm since proteins absorb light at 280 nm.

,

To export a reference to this short article please select a stye that is referencing:

If you are the writer that is original of essay with no much longer want your work posted on the UKDiss.com web site then please:

Related Services

,

Our academic writing and marking solutions will allow you to!

Related Lectures

,

Study at no cost with our range of college lectures!

,

Looking for the role that is flexible
Do you have a 2:1 level or higher?

Study Resources

,

Free resources to assist you with your college studies!

We have gotten press that is widespread since 2003

Your UKEssays purchase is secure and we’re ranked 4.4/5 on reviews.co.uk

All work is written to purchase. No plagiarism, assured!

We are right here to answer any relevant concerns you have about our solutions

Copyright © 2003 – 2020 – UKEssays is a trading title of most responses Ltd, an ongoing business registered in England and Wales. Business Registration No: 4964706. VAT Registration No: 842417633. Registered Information Controller No: Z1821391. Registered office: Venture Home, Cross Street, Arnold, Nottingham, Nottinghamshire, NG5 7PJ.

*You can also browse our help articles right here >

, “

2769 terms (11 pages) Essay

first Jan 1970 therapy guide this

Disclaimer: this ongoing work is submitted by a college pupil. This isn’t an example of the ongoing work made by our Essay composing provider. You will see samples of our work that is professional right here.

Any opinions, findings, conclusions or guidelines expressed in this product are the ones associated with the writers and don’t necessarily mirror the views of UKEssays.com.

Analysis methodology means the various steps that are sequential by a researcher in learning the problem with certain goals in mind. It’s an description associated with the method of systematic and investigation that is critical an identified topic of research. With an description associated with the elements in the concept of Research Onion (Saunders, Lewis, & Thomhil, 2007) the researcher shall explain the actions used to get this done research. In short we can state that the extensive research methodology is the description, description and reason of various methods of performing research (Sharavanavel, 2006).

3.2. UNDERSTANDING ANALYSIS PROCESS

The concept of research onion (Saunders, Lewis, & Thomhil, 2007) are going to be utilized to understand the extensive research procedure used by the researcher.

The layers that are main the research onion are research philosophy, research approaches, strategy, alternatives, time horizon, and strategies and methods of information collection. An explanation of some these aspects of research onion will provide the researcher with required knowledge to conduct this scholarly study(Saunders, Lewis, & Thomhil, 2007).

Figure : 3.1

Source: Saunders, Lewis, & Thomhil (2007)

3.2.1. ANALYSIS PHILOSOPHY

A research philosophy is a belief or a basic concept regarding the collection, interpretation, and analysis of information gathered. There are numerous philosophies are explained in Saunder’s research onion. The most important one of them are Positivism, Realism, interpretative, Objectivism, Subjectivism, Pragmatism, Functionalist, Interpretative, revolutionary humanist, Humanist and structuralist (Saunders, Lewis, & Thomhil, 2007).

If you need advice about composing your essay, our professional essay writing service is right here to aid!

Positivism holds reality because stable. a view that is objective can be described by this. This philosophy further says that knowledge that are not based on positivism is blurred and invalid(Miller Strang & Miller, 2010). Realism is a philosophy that holds approach that is scientific development and knowledge . The assumption that is basic of philosophy is the fact that which is actually is. It’s separate through the belief associated with the individuals. There are two main types of realism. The one is direct plus the other realism that is critical. The world is static and having no change from the point of view of a direct realist. Critical realism holds modification as constant (Buchanam & Bryman,2009). In Pragmatism problems are dealt with straight. This philosophy is more interested in outcomes or truth as opposed to the concepts associated with it. (William James, 2009) This philosophy holds that the concept or principle that is theoretical be set on the basis of how it operates (Saunders, Lewis, & Thomhil, 2007).

The philosophy used by the researcher in this scholarly research realism

3.2.2. ANALYSIS APPROACHES

The second layer that is last of research onion of Saunders (Saunders, Lewis, & Thomhil, 2007) is research approaches.

Figure:3.2

Supply: Created by the writer (2010)

There are two main types of approaches the Deductive and Inductive (Jonker & Pennink, 2009).

3.2.2.1 Deductive Approach

It is a journey from basic to specific. Right Here the theory plus the concept are checked first and then proceed to outcomes which are more specific. Right Here summary follows logically through the facts that are availableJonker & Pennink, 2009).

3.2.2.2 Inductive Approach

An empirical observation takes the researcher to a result in this approach. Right Here observations that are specific achieve to more generalizations and developing up of theories. It’s from specific to basic. This method is mainly used in the research that is qualitativeMyers, 2009).

3.2.2.3 Quantitative Approach

Quantitative methods constantly concentrate on the true figures and its particular frequencies. It does not stress on the experience and definitions but quantify the information gathered. The data will be subject to rigorous and strict analysis (Kothari, 2008) in quantitative approach.

3.2.2.4. Qualitative Approach

The data is collected mainly to describe factors rather than reaching to a statistical inference in qualitative Approach. It’s an exploratory research method that is unstructured. Right Here the important factors of character, behavior, mindset, viewpoint etc are subjectively assessed. (Myers, 2009) Usually qualitative studies are used for explanatory purposes (Kothari, 2008).

This study is a qualitative research with an approach that is inductive. Right Here the researcher will look into the specific situation associated with the nurses in the hospital that is selected attempt to proceed to the generalization associated with the findings.

3.2.3. ANALYSIS STRATEGY

The following layer that is important the research onion is research strategy. There are numerous strategies that scientists adopt for the research study that is particular. In Saunders’ research onion research that is various are explained. Some of the strategies are test, study, action research, case study, grounded theory, ethnography and research that is archivalSaunders, Lewis, & Thomhil, 2007).

Experimental scientific studies are mainly used for the extensive research in real sciences. It’s utilized to recognize the main cause impact relationships and inferences that are verifying. The main features of this system are isolation of facets, replication of test, and measurement that is quantitative of (Sharavanavel, 2006).

Survey research studies big and small populations by selecting and learning examples selected through the populations to find out the incidence that is relative circulation and interrelations of sociological and psychological factors. This scientific studies are mainly used to investigate social and factors that are psychologicalSaunders, Lewis, & Thomhil, 2007).

Case study is a comprehensive research of the unit that is social. Right Here the subject of the study is a individual, team, or a institution that is social. The context is analysed in detail in this research. Real world circumstances in real world context is studied and analysed(Sharavanavel, 2006).

Action scientific studies are research associated with a project that is particular issue (Coghlan & Brannick, 2009). The objective of this research can be finding solution that is immediate an issue faced in a culture. Consequently we can state that action research is concerned with real life. It studies the ‘what’, ‘how’, and that is‘why of life. In short it’s an attempt to understand the issues that are present a help predict the near future changes (Jonker & Pennink, 2009).

Grounded concept is a research study that is qualitative. It’s mainly used in the sciences that are social. When the traditional method that is scientific to start the research with a theory this method is adopts the system of going straight into the data collection first. All the data gathered are placed in different codes to recognize factors that are common. Through the combined group of these codes then the concept is created (Charmaz, 2006).

Ethnography is a unique research method that is qualitative. The researcher will stay in the research location in this study. The researcher remains because of the populace and get a hand that is first through the specific tradition or team (Murchison, 2009).

The element that is final the Research strategy is Archival research strategy. It means the study that is entire be based on the materials associated with the research kept in some archives by other scientists. A huge quantity of data is available and so often the data remain uncontrollable in this strategy. Therefore it is impossible to make conclusions that are casual the basis of these types of information (Graham, Towl &. Crihton, 2010).

The researcher has adopted the strategy of a case study to obtain data from the samples selected in this research. The study are going to be carried out one of the nurses in a hospital that is single.

3.2.4. ALTERNATIVES

The layer that is next the research onion is Selection. These alternatives can be divided into Mono method, Mixed technique and Multi technique. In this researcher adopts one method for their research from different methods of research. The researcher adopts generally two methods such as qualitative or quantitative research methods in Mixed method. A number of research methods are brought together to investigate or to make a study (Saunders, Lewis, & Thomhil, 2007) in Multi method.

Our experts that are academic prepared and waiting to assist with any writing task you could have. From easy essay plans, right through to dissertations that are full you are able to guarantee we have a service completely matched to your needs.

The researcher has adopted mixed method and multi method of choice in this study of the occupational stress of the nurses. Yet just the qualitative research technique is utilized right here by the researcher to complete the research on the work-related anxiety one of the nurses.

3.2.5. TIME HORIZONES

Time Horizons are suggested as a right time target fixed. A time limit is usually fixed for the conclusion of the activity or task. It refers to a preparation or a planning. Right Here the right time limit for the conclusion of the study is explained. There are two main types of time perspectives. 1st one is Cross Sectional plus the 2nd is Longitudinal. The time is prefixed for the completion a research in Cross sectional study. In longitudinal no right time is limit for the data collection, information analysis, and other conclusion associated with the research. Behavioral studies usually carried out in longitudinal methods as it requires a time that is long observation (Saunders, Lewis, & Thomhil, 2009).

The time horizon was cross sectional method that was adopted by the researcher in this study of the occupational stress of the nurses. The time horizon for performing the extensive research was prefixed and prepared. a period that is limited of was allotted to the researcher to conduct the data collection for the examples chosen.

The most elements that are important a study are information collection and information analysis. a methodically collected information and its particular analysis that is proper will a research concern. It is a technique with a procedure (Bryman & Bell, 2007). The dependability and validity of the extensive scientific studies are straight applied to the dimension of information (Wood & Ross-Kerr, 2010). There are two main types of information gathered for the analysis that is systematic any research. They’ve been Primary Data and Secondary Data (Kumar, 2008).

Main Data refers to that information that are generated very first time or that are generated to meet the specific requirements associated with the research at hand. Main information is gathered straight through the participants or the topics of test (Yin, 2010). Here there is a control that is proper the information collected (Bhattacharyya, 2006). The major drawback right here is that it’s more time eating. Some times the data that are primary gets to be more difficult since the suitable persons or examples aren’t at hand (factor & Bradbury, 2006).

There are numerous sources of main information. They’ve been, Questionnaire, Interview Schedules and interviews, Focus teams, Case Studies, Experiments, findings, studies and Discussions (Collrel & McKenzie, 2010).

The researcher, in this research, has gathered the primary source of information by employing meeting routine, and questionnaire that is structured. The Questionnaire enlists concerns, which translate the extensive research goals into specific concerns. Issue should also encourage the respondent so that the data that is necessary acquired. The researcher has employed both factual as well as opinion and attitude questions in this study.

3.2.6.2. Secondary Data

Additional information is not gathered straight through the participants. Here some others had collected the data(Bhattacharyya, 2006). It can be collection of the overview of the data that are primary. The collection of additional information is cheap when it comes to economy and time. For the contrast of two types of data and reaching to an inference data that are secondary be helpful. Yet the data that are secondary be outdated and that can be subjective as it has already developed in the mind of somebody else. Additional information can be uncontrollable and vast making it become improper for the purpose that is particularSaunders, Lewis, & Thomhil, 2007).

There are numerous sources of additional information. Publications, Journals, Information Papers, Reports and publications, Articles in magazines and web sites, federal government data, organization or company data (Bryman & Bell, 2007).

The researcher will be using various materials pertaining to the topic of the research in this study to collect the secondary data. Lots of publications, wellness related articles, wellness journals, web pages, medical center data and news documents are going to be used for the collection of additional information.

関連記事

コメントは利用できません。
ページ上部へ戻る